• About Desktop Forensic Bundle
  • Password Recovery Basics
    • Types of Password Protection
    • Recovering Strong Passwords
      • Brute-force Attack
      • Mask Attack
      • Dictionary Attack
      • Dictionary Mutations
      • Hybrid Attack with Rules
  • Password Recovery Programs
    • Advanced Archive Password Recovery
      • Introduction
      • Requirements
      • How to work with the program
        • Passwords and encryption
        • Selecting the options
          • Opening the archive
          • Type of attack
          • Brute-force range options
          • Start from password
          • Password mask
          • Password length
          • Dictionary options
          • Known plaintext attack (ZIP)
          • Known plaintext attack (ARJ)
          • Guaranteed WinZip attack
          • Password from keys
          • Auto-save
          • Other options
          • Advanced options
        • Save and Read setup
          • Save and Read setup
        • Benchmarks
          • Benchmark
        • Getting the results
          • Recovery process
          • Program status
          • Results
      • Known bugs and limitations
        • Known bugs and limitations
      • Tips & tricks
        • Files with different passwords
        • What to start from
        • Command line
      • Technical support
        • Contacting us
        • Where to get the latest version
      • License and registration
        • End-user license agreement
        • Registration
        • Limitations of the trial version
      • Acknowledgements
        • Acknowledgements
    • Advanced Intuit Password Recovery
      • Introduction
      • Program information
        • System requirements
        • Working with AINPR
        • Quicken passwords
        • QuickBooks passwords
      • Technical support
        • Contacting us
        • Where to get the latest version
      • License and registration
        • End-user license agreement
        • Registration
        • Limitations of unregistered version
    • Advanced Lotus Password Recovery
      • Introduction
      • System requirements
      • Working with ALPR
      • Technical support
        • Contacting us
        • Where to get the latest version
      • License and registration
        • End-user license agreement
        • Registration
        • Limitations of unregistered version
    • Advanced Mailbox Password Recovery
      • Introduction
      • System requirements
      • Working with AMBPR
        • User interface
        • Recovery
          • Search for email clients
          • Automatic password recovery
          • Manual password recovery
          • Mail server emulator (auto mode)
          • Mail server emulator (manual mode)
        • Options
        • Exit
      • Technical support
        • Contacting us
        • Where to get the latest version
      • License and registration
        • End-user license agreement
        • Registration
        • Limitations of unregistered version
    • Advanced Office Password Breaker
      • Introduction
      • Requirements
      • About Word and Excel encryption
      • Supported and unsupported formats
      • Working with AOPB
        • Foreword
        • Searching for encryption key
        • Decrypting the document
        • Options
        • Rainbow attack
        • Command line interface
      • Technical support
        • Contacting us
        • Where to get the latest version
      • License and registration
        • End-user license agreement
        • Limitations of unregistered version
        • Registration
    • Advanced Office Password Recovery
      • Introduction
      • End-user license agreement
      • Getting Started with AOPR
        • System requirements
        • Supported file types and passwords
        • Supported hardware
        • Getting Help and Technical Support
          • Contacting us
          • Where to get the latest lersion
      • Working with AOPR
        • Recovering Document Passwords
          • Selecting a file
          • Analyzing the results
        • Working with Projects
          • Creating a project
          • Saving a project
        • Outlook E-Mail Accounts
          • Recovering E-Mail account passwords
          • Outlook Password Storage Types
        • Microsoft Passport stored passwords
        • VBA Backdoor
      • Setting AOPR Options
        • Type of Attack
        • Preliminary Attack
        • Customizing the Preliminary Attack
        • General Options
          • Other options
        • Password Cache
          • About Password Cache
          • Managing Password Cache Files
      • Passwords Manual
        • Strong Passwords
          • Word/Excel Password to Open (Office 97/2000)
          • Word/Excel/PowerPoint Password to Open (Office XP/2003)
          • Microsoft OneNote Password to Open
          • Microsoft Money 2002+ Password to Open
          • Office 2007 and later: password to open
        • Weak Passwords
          • Word/Excel Password to Open (Weak Encryption)
          • Visual Basic for Applications (VBA)
          • Microsoft Access
            • Access Share-Level (Database) Password, Owner Information
            • Access User-Level Passwords
          • Microsoft Excel
            • Excel Document - all Passwords except Password to Open
            • Excel Add-In (XLA) Protection
            • Pocket Excel
          • Microsoft Word
            • Word Document - all Passwords except Password to Open
          • Microsoft Outlook
            • Outlook Personal Storage File Password
            • Outlook E-Mail Accounts Passwords
          • Microsoft PowerPoint
          • Microsoft Money
          • Microsoft Project
      • Troubleshooting
        • Creating the Debug Log
      • Trial Version of AOPR and Registration
        • Limitations of the Trial Version
        • Registration
    • Advanced PDF Password Recovery
      • Introduction
      • Requirements and limitations
      • Using the program
        • About PDF encryption
        • Selecting the attack
          • Encrypted PDF file
          • Type of attack
          • Brute-force range options
          • Start from password
          • Password mask
          • Password length
          • Dictionary options
          • Key search
          • Auto-save
          • Other options
          • Advanced options
        • Save and Read setup
          • Save and Read setup
        • Benchmarks
          • Benchmark
        • Getting the results
          • Recovering process
          • Program status
          • Results
      • Tips & tricks
        • Where to begin
        • Command line
        • Error messages
      • Technical support
        • Contacting us
        • Where to get the latest version
      • License and registration
        • End-user license agreement
        • Registration
        • Limitations of unregistered version
    • Advanced Sage Password Recovery
      • Introduction
      • Program information
        • System requirements
        • ACT! password recovery
        • PeachTree/Accounting password recovery
        • Other Sage products
      • Technical support
        • Contacting us
        • Where to get the latest version
      • License and registration
        • End-user license agreement
        • Registration
        • Trial version limitations
    • Advanced SQL Password Recovery
      • Introduction
      • Program information
        • System requirements
        • Working with ASQLPR
      • Technical support
        • Contacting us
        • Where to get the latest version
      • License and registration
        • End-user license agreement
        • Registration
        • Trial version limitations
    • Advanced WordPerfect Office Password Recovery
      • Introduction
      • System requirements
      • Working with AWOPR
      • Technical support
        • Contacting us
        • Where to get the latest version
      • License and registration
        • End-user license agreement
        • Registration
        • Trial version limitations
    • Elcomsoft Internet Password Breaker
      • Introduction
      • Program information
        • System requirements
        • Outlook PST password
        • Internet Explorer passwords
        • Other browsers
        • Mail and news passwords
        • Password storage types
        • Options
        • Report and Password list
      • Technical support
        • Contacting us
        • Where to get the latest version
      • License and registration
        • End-user license agreement
        • Registration
        • Trial version limitations
    • Elcomsoft Wireless Security Auditor
      • Introduction
      • Program information
        • System requirements
        • About wireless security
        • Working with EWSA
        • Capturing network packets
        • Installing the NDIS driver
        • Attack settings
        • Dictionary mutations
        • Hardware acceleration
      • Technical support
        • Contacting us
        • Where to get the latest version
      • License and registration
        • End-user license agreement
        • Registration
        • Trial version limitations
  • System and Data Recovery Programs
    • Advanced EFS Data Recovery
      • Introduction
      • Working with AEFSDR
        • About EFS (Encrypting File System)
        • How Advanced EFS Data Recovery works
        • The Wizard mode
        • Scan for encryption keys
        • Scan for encrypted files
        • Browse for encrypted files
        • Decrypting files
        • Program options
        • System requirements
      • Technical support
        • Contacting us
        • Where to get the latest version
      • License and registration
        • End-user license agreement
        • Registration
        • Limitations of unregistered version
    • Elcomsoft Forensic Disk Decryptor
      • Introduction
      • Program information
        • System requirements
        • Working with the program
        • Extract keys
        • Decrypt or mount disk
        • TrueCrypt and VeraCrypt
      • Technical support
        • Contacting us
        • Where to get the latest version
      • License and registration
        • End-user license agreement
        • Registration
        • Legal notices
    • Elcomsoft Password Digger
      • Introduction
      • Program information
        • System requirements
        • Working with the program
        • Obtaining keychain files
        • Options
      • Technical support
        • Contacting us
        • Where to get the latest version
      • License and registration
        • End-user license agreement
        • Registration
        • Legal notices
    • Elcomsoft System Recovery
      • Introduction
      • End-user license agreement
      • Contacting us
      • Program information
        • Important compatibility notes
        • Creating bootable media
        • How to use the program
          • Booting from a CD or USB device
          • Mass-stogare drivers
          • Database source and working mode
          • Select operating system or SAM/AD files location
          • Local user accounts
          • AD accounts
          • Domain cached accounts
          • SAM database editor
          • Disk tools
          • Unlock BitLocker drives
          • Passwords and credentials
          • Miscellaneous
    • Proactive Password Auditor
      • Introduction
      • Requirements
      • How to work with the program
        • About Windows passwords
        • How the program works
        • Obtaining password hashes
        • Credentials
        • Password cracking
          • Password cracking methods
          • Dictionary attack
          • Brute-force attack
          • Rainbow attack
          • Recovery process and results
        • Reports
        • Program options
      • Technical support
        • Contacting us
        • Where to get the latest version
      • License and registration
        • End-user license agreement
        • Registration
        • Limitations of unregistered version
    • Proactive System Password Recovery
      • Introduction
      • System requirements
      • Working with PSPR
        • User interface
        • Main menu
          • Logon password
          • Cached passwords
          • RAS entries
          • Shared info
          • Recovered hashes
          • Screensaver password
          • Domain cached credentials
        • Advanced features
          • Groups and users
          • NT secrets
          • Run as
          • Windows CD key
          • Net passwords
        • Unmasking hidden passwords and re-enabling disabled controls
          • Unhiding passwords masked with asterisks
          • Control reviver
          • Registry and AD
          • Password reset disk
          • Mail/FTP server emulator
        • Misc features
          • Protected storage
          • Remote assistance
          • Script decoder
          • Remote desktop
          • Wireless network
        • Recover PWL
          • View PWL file
          • Bruteforce attack
          • Dictionary attack
        • Options
          • General options
          • Attacks options
          • NT hash options
      • Technical support
        • Contacting us
        • Where to get the latest version
      • License and registration
        • End-user license agreement
        • Registration
        • Trial version limitations
  • End-user license agreement
  • Technical support